Professional Documents
Culture Documents
5, MAY 2009
Abstract—In orthogonal frequency division multiplexing time domain. We know that, as long as the samples in the
(OFDM) systems, coarse frame timing can be acquired from one FFT window belong to the same OFDM symbol, the inter-
or more training symbols preceding every OFDM burst. The symbol interference (ISI) and inter-carrier interference (ICI)
existing literature studied the case where there was only one
training symbol consisting of identical segments. We generalize are avoided. Therefore, it suffices for the coarse timing esti-
the timing synchronization methods to take advantage of multiple mator to find an ISI-free FFT window of the training symbol.
training symbols and only require the segments to be highly The residual timing offset results in a linear phase shift on the
correlated but not necessarily identical. We construct a series of subcarriers, which can significantly degrade the performance
component timing metrics, one for each pair of the highly corre- of pilot-based channel estimation and tracking algorithms [6].
lated segments, and combine them linearly to minimize the false
alarm probability while keeping the asymptotic missed detection Then, the refined joint channel and timing estimators [7]–
probability to the same level as other techniques. The OFDM data [9] are required for more accurate timing estimates using the
symbols in a downlink burst can have different power levels to frequency domain signal.
reach the users at different distances. We take that into account
In some practical OFDM systems, like the IEEE 802.11 [10]
and yield more realistic results than those in existing literature
which only considered the equal power case. The performance of and IEEE 802.16 [11], the training symbols are defined in the
the proposed method is analyzed in three scenarios generalized frequency domain by using one out of every Mi subcarriers,
from the IEEE 802.11 and IEEE 802.16 standards. Numerical where i is the training symbol index. When Mi is not divisible
results are presented to confirm the robustness of the proposed by the number of subcarriers, e.g., Mi = 3 for the downlink of
method in various channel conditions.
IEEE 802.16 OFDMA (WiMAX) systems, the training symbol
Index Terms—Orthogonal frequency-division multiplexing is made up of highly correlated but not identical segments in
(OFDM), synchronization. the time domain. This scenario has not been investigated by
the aforementioned literature, and only a heuristic solution is
I. I NTRODUCTION provided by Bhatt et al. [12].
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2559
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
2560 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009
and base our timing estimator on the correlators defined as Because the knowledge of signal power σi2 is not available
−d−1
N to the receiver, the ideal normalization is not practical. An
R[n, d] r∗ [n + k]r[n + k + d] (5) approximation to that is to use R[n̂i , 0] as an estimate of N σi2 ,
k=0
and we define the component timing metric as
where (·)∗ denotes complex conjugate. The correlator given by N 1 |R[n, di,k ]|
Tc [n, di,k ] · · . (12)
(5) can be easily implemented on hardware using the integrate- N − di,k |ρi (di,k )| R[n, 0]
and-dump algorithm [3]. At perfect timing position n̂i , using (6), we have
Denote n̂i as the ideal start of the FFT window at the N 1 |R[n̂i , d]|
receiver for the ith training symbol. In Appendix A, we show Tc [n̂i , d] = ·
N − d |ρi (d)| R[n̂i , 0]
that when the signal is stronger than the noise and d is close
to a multiple of N/Mi , N 1 (N − d)|ρi (d)|σi2
≈ ·
2π N − d |ρi (d)| N (σi2 + σw2)
R[n̂i , d] ≈ ej N 0 d (N − d)σi2 φi (d) ρi (d) + Θ(n̂i , d) (6) σ2
= 2 i 2. (13)
where σi + σw
−d−1
N This indicates that at high SNR the timing metric is very close
Θ(n̂i , d) w∗ [n̂i + k]x̂[n̂i + k + d] to 1. We also note that the timing metrics in the references
k=0 [1], [2], [4] are equivalent to the component timing metric
N−1 Tc [n, (N/Mi )] when Mi is divisible by N .
+ w[n̂i + k]x̂∗ [n̂i + k − d] (7) Denote n̄i as a timing position that is far away from the
k=d ideal one n̂i , i.e., none of the samples from n̄i to n̄i + N − 1
and belong to the ith training symbol. In Appendix B, we show
that in AWGN channels and for both equal and unequal power
1, d is multiple of (N/Mi );
ρi (d) sin( N
π
Mi d Np [i])
cases, Tc [n̄i , di,k ] can be well approximated by a Rayleigh dis-
Np [i] sin( N
π
Mi d)
, others. tributed random variable with cumulative distribution function
(8) (cdf)
2π λ 2
− λ2
ej N ϑi d
, d is multiple of (N/Mi ); P (Tc [n̄i , di,k ] < λ) ≈ 2
f (x|σ̄i,k ) dx = 1 − e
2σ̄
(14)
φi (d) π d (Mi (Np [i]−1)+2ϑi )
i,k
e j N , others. 0
x2
(9) −
2σ̄2
where 2
f (x|σ̄i,k )
= σ̄2 e x 2
and σ̄i,k = 12 ρ2 (d1i,k ) N −d
i,k 1
.
We can see that only the first term in the bracket of the right i,k i i,k
Our simulation shows that, in multipath channels where the
hand side of (6) represents the useful signal, whose magnitude
channel delay spread is much shorter than the OFDM symbol
is given by (N − d)|ρi (d)|. Because |ρi (d)| decays quickly as
duration, (14) is also a good approximation to the true statistics
d moves away from a multiple of N/Mi , we propose to choose
of the component timing metric.
di,k [k N/Mi ], (10)
C. Combining the Timing Metrics
where k ∈ [1, Mi −1], and [·] denotes the function that outputs
Multiple component timing metrics can be constructed for
the integer closest to its argument. The existing papers [1]–[5]
have only studied the case where N/Mi is an integer, while the training symbols. Although each one of them gives a
this paper investigates a more general scenario that covers the timing estimate, it is possible to combine them for better
generic WiMAX training symbols where Mi = 3. It is worth performance. We propose to linearly combine the component
noting that when d = 0, E {R[n̂i , 0]} = N (σi2 + σw 2
) gives timing metrics to minimize the false alarm probability while
keeping the asymptotic missed detection probability low. The
the signal plus noise energy.
combined timing metric is defined as
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2561
bined timing metric. This justifies our selection of {di,k } in The combined timing metric becomes
(10).
M1 −1 N−i MN1 ∗ N
i=1 k=0 r [n + k]r[n + k + i M1 ]
2
D. Summary T [n] = N−1 .
M1 − 1 2 |r[n + k]|
k=0
We briefly summarize the proposed coarse timing estimator (22)
as follows. Although derived from different optimization criteria, the
proposed timing metric coincides with those in [1], [5] respec-
1) Construct (Mi −1) component timing metrics Tc [n, di,k ]
tively for M1 = 2 and M1 = 4 cases. It is easy to compute
for each training symbol using (12) where {di,k } are
given by (10).
M1 −1
2 2 2
2) Compute the combined timing metric T [n] using (15) = ωi,k σ̄i,k = . (23)
N (M1 − 1)
where {ωi,k } are given by (19). k=1
3) Once the combined timing metric T [n] reaches the This indicates that the false alarm probability decreases as the
detection threshold λ, the position corresponding to the number of identical segments increases.
maximum of the timing metric within the following N Next, we analyze the missed detection probability. Define
OFDM samples is the coarse timing estimate.
ZA [n̂1 ] RA [n̂1 ] − λ R[n̂1 , 0] (24)
It should be noted that choosing the maximum of the timing M1 −1
metric within certain window avoids the dependency of coarse where RA [n̂1 ] M12−1 k=1 |R[n̂1 , d1,k ]|. As shown in
timing estimates on the threshold setting. Shi and Serpedin [5] Appendix D,
assumed the coarse timing estimate to be where the threshold
E {ZA [n̂1 ]} = N σ12 (1 − λ) − N σw
2
λ (25)
is first reached. Figure 2 shows an example to illustrate the
difference between their approach and ours. It is shown that V ar {ZA [n̂1 ]} ≈ 2N σ12 σw
2
(1 − λ) .2
(26)
our estimates are independent of the threshold settings and Following [3] and [5], we approximate ZA [n̂1 ] by a Gaussian
must fall in the correct timing window for any threshold random variable, and the missed detection probability is given
lower than the peak. However, Shi and Serpedin’s estimates by
are determined by the threshold settings, which have to be
precisely set close to the peak to obtain correct estimates. P (T [n̂1 ] < λ) = P (ZA [n̂1 ] < 0)
√
In practical OFDM systems where the timing metrics change 1 N σ12 λ 2
σw
dramatically from burst to burst due to the channel variation, ≈ erfc − (27)
2 2 2
σw 1 − λ σ12
our approach gives more robust performance.
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
2562 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009
0
10
standards. In the former, N = 128, M1 = 8, M2 = 2; in
Sim. M =2
1
the latter, N = 256, M1 = 4, M2 = 2. From (19), we can
−1
10 Sim. M1=4 calculate
Sim. M1=8 N − kN/Mi
−2
10 Ana. ωi,k = M1 −1 M2 −1
Missed i=1 (N − iN/M1 ) + i=1 (N − iN/M2 )
Error Probability
Detection
−3
10 2(Mi − k)
= . (28)
Mi (M1 + M2 − 2)
−4
10
False Alarm
6dB
The false alarm probability decays exponentially with the
10dB
−5
10
inverse of
2 Mi −1
2 2 2 1
−6
10 = ωi,k σ̄i,k = . (29)
i=1
N M1 + M2 − 2
k=1
−7
10
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Comparing (29) to that of Case A in (23), we can see the
Detection Threshold (λ)
benefit of combining the long preamble is negligible when
the number of identical segments in the short training symbol
Fig. 3. Performance in AWGN channel (Case A). is large, i.e., in the IEEE 802.11 case. However, for smaller
M1 as in the IEEE 802.16 case, the combined metric gives
+∞ 2 much fewer false alarms.
where erfc(z) √2π z e−t dt. This indicates that the
Similar to the approach we used in Case A, define
missed detection
probability
monotonously decreases to zero
as the SNR σ12 /σw 2
increases. And, to limit the missed ZB [n̂1 ] RB,1 [n̂1 ]R[n̂2 , 0] + RB,2 [n̂2 ]R[n̂1 , 0]
σ12
detection probability within 50%, it requires λ ≤ σ2 +σ 2. − λR[n̂1 , 0]R[n̂2 , 0] (30)
This upper bound of λ varies from 0.5 to 0.9 as the SNR
w 1
2
M −1
where RB,i [n̂i ] M1 +M 2 −2 k=1 |R[n̂i , di,k ]|. In Ap-
i
increases from 0dB to 10dB, which indicates that the missed pendix E, we show that
detection probability is highly sensitive to the noise level, and
optimizing the threshold for a large range of SNR is virtually E {ZB [n̂1 ]} = N 2 σ12 (σ12 + σw
2
) − λN 2 (σ12 + σw
2 2
) (31)
impossible. Another interesting observation from (27) is that V ar {ZB [n̂1 ]} ≈ 4N 3 σ16 σw
2
(1 − λ)2 . (32)
the missed-detection probability does not depend on M1 . This
Thus,
means that using more identical segments in the training
symbol will not lower the missed detection probability. In P (T [n̂1 ] < λ) = P (ZB [n̂1 ] < 0)
other words, Schmidl’s estimator [1] cannot be outperformed
√
1 N σ12 λ 2
σw
in terms of missed detection probability by more complex ≈ erfc √ − . (33)
algorithms including Shi and Serpedin’s method [5]. 2 2 2 2
σw 1 − λ σ12
We numerically evaluate the missed detection and false Compared to (27),
alarm probabilities of Case A for an unequal power OFDM • The 50% missed detection probability corresponds to λ =
system with 512 subcarriers in an AWGN channel. 5% of the σ12 /(σ12 + σw
2
), which is same as that of Case A.
subcarriers at each end of the spectrum are unused, and the • Combining the timing metric of the second symbol
CFO is modeled by a random variable uniformly distributed slightly increases the missed detections at high SNR.
in [−10, 10] subcarrier spacing. When testing the false alarm • Because the missed detection probability given by (33)
probability, the relative power level of each OFDM symbol is not a function of M1 or M2 , using more identical
is independently selected from {−12dB, −9dB, · · · , +9dB} segments in the training symbols does not reduce missed
with equal probability and the noise power is fixed to −10dB. detections.
The modulation scheme for each data symbol is independently We verify the analytical results using the same simula-
selected from QPSK, 16-QAM or 64-QAM also with equal tion environment as that of Case A and plot the results in
probability. When testing the missed detection probability, the Figure 4. The analytical and simulation results for Case B
training symbol is QPSK modulated and randomly generated are represented by the solid lines and the various markers
for each experiment, and we change the power of the training respectively. The dotted lines are the analytical results in the
symbol to validate our analytical results. In Figure 3, the scenario where only the short training symbol is utilized. It is
solid lines represent the analytical results given by (17) and shown that our analysis agrees with the simulations reasonably
(27), and the various markers represent the simulation results well. The figure suggests that using both training symbols
averaged for at least 105 independent OFDM symbols. The can considerably reduce the false alarm probability for the
figure shows that our analysis matches the simulation results M1 = 4 case, but the improvement is marginal for the M1 = 8
very well. case. The missed detection curves of Case A and B are very
close to each other under the given SNRs, and all of them
B. Case B: Two training symbols, N is multiple of both M1 exhibit very steep rising edges. This means that combining
and M2 two training symbols does not have practical impact on the
This case generalizes the short and long training symbol detection performance, which is largely determined by the
schemes specified in the IEEE 802.11 and IEEE 802.16 SNR.
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2563
0 0
10 10
Sim. M1=4, M2=2 Sim. M1=3
−1 −1 Sim. M1=5
10 Sim. M =8, M =2 10
1 2
Ana. Ana. M1=3
−2 Case A Reference (same M1) −2
Ana. M =5
10 10 1
Missed Case A Reference Missed
Error Probability
Error Probability
−3
Detection −3
Detection
10 10
−4 −4
10 10
False Alarm False Alarm
6dB 10dB 6dB 10dB
−5 −5
10 10
−6 −6
10 10
−7 −7
10 10
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Detection Threshold (λ) Detection Threshold (λ)
Fig. 4. Performance in AWGN channel (Case B). Fig. 5. Performance in AWGN channel (Case C).
C. Case C: One training symbol, N is not multiple of M1 simulation results. Also, we use dotted lines to represent the
This case generalizes the IEEE 802.16 OFDMA (WiMAX) analytical missed detection probabilities of Case A under the
downlink channel where M1 = 3. In this case, given SNRs. It is shown that our analysis agrees with the
simulations reasonably well. The figure suggests that using
(N − d1,k )ρ21 (d1,k ) more highly correlated segments in the training symbols re-
ω1,k = M1 −1
2
m=1 ρ1 (d1,m )(N − d1,m ) duces false alarms but has little impact on the missed detection
2(N − d1,k ) ρ21 (d1,k ) probability, which is largely determined by the SNR. These
= M1 −1 2 (34) results coincide with our findings in the former two cases.
N m=1 ρ1 (d1,m )
where the last equality follows the fact that |ρi (d)| = V. S IMULATION R ESULTS
|ρi (N − d)|. The combined metric’s false alarm probability
In this section, we present simulation results in realistic
is determined by
wireless communication scenarios. An IEEE 802.16 [11]
M1 −1 (WiMAX) system is modeled in the simulations using two
2 2 2 1
= ω1,k σ̄1,k = M1 −1 2 . (35) kinds of training symbols specified for the OFDM and
N k=1 ρ1 (d1,k )
k=1 OFDMA physical layers respectively. The OFDM physical
Define layer has N = 256 subcarriers, and employs two training
ZC [n̂1 ] RC [n̂1 ] − λR[n̂1 , 0] (36) symbols with M1 = 4 and M2 = 2. The OFDMA physical
layer has N = 512 subcarriers and uses only one training
where RC [n̂1 ] M1 −12 2
K1
k=1 |ρ1 (d1,k )R[n̂1 , d1,k ]|.
ρ1 (d1,k ) symbol with M1 = 3. The carrier frequency is set to 3.5GHz,
k=1
In Appendix D, we show that cyclic prefix is 1/8 of one symbol duration. The true CFO is
modeled by a uniformly distributed random variable within
E {ZC [n̂1 ]} = N σ12 − N λ(σ12 + σw
2
) (37) ±20 subcarrier spacing. Each OFDM burst lasts for 5ms,
and containing 47 OFDM symbols plus an idle period between
the bursts. Every point in the figures is an average of at least
V ar {ZC [n̂1 ]} ≈ 2λ2 N σ12 σw
2
− 4λN σ12 σw
2
3 × 104 independent experiments, each of which contains at
2 M −1 M −1 least one complete OFDM burst, but the starting position of
2 1 1
+ M1 −1 ρ(d1,k1 )ρ(d1,k2 ) observation is randomly selected. The training symbols have
2
k=1 |ρ(d1,k )| k1 =1 k2 =1 equal power, which is 9dB higher than the average power
· ((N − max(d1,k1 , d1,k2 ))ρ(d1,k2 − d1,k1 ) level of data symbols. Each data symbol’s relative power level
+ max(N − d1,k1 − d1,k2 , 0)ρ(d1,k2 + d1,k1 )). (38) is independently selected from {−12dB, −9dB, · · · , +9dB}
with equal probability, and the modulation scheme is randomly
From (37), we can tell that the threshold corresponding to selected from QPSK, 16-QAM or 64-QAM also with equal
50% missed detection probability of Case C is the same as probability. The SNR is defined as the ratio between the
those of Case A and B. Considering the steepness of the average power of the signal and noise in every received OFDM
missed detection curves, we expect the detection performance sample of the training symbol.
of Case C to be similar to that in the former two cases. Two channel models are used in the simulations, namely
We verify the analytical results using the same simulation “CH-A” and “CH-B”. CH-A is a stationary wireless com-
environment as that of Case A. The results are plotted in munication channel known as SUI-3 [13]. The channel has
Figure 5 where we use solid and dashed lines to represent 3 taps with relative delays {0, 0.4μs, 0.9μs} and power
the analytical results, and various markers to represent the {0dB, −5dB, −10dB}. The magnitude of the first channel
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
2564 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009
tap follows Rice distribution, and those of the other two are 10
0
model [15] to emulate the Rayleigh fading on each tap of CH- 0dB, CH−A, Prop.
0dB, CH−A, Conv.
B where the vehicle speed is set to 120km/h and the maximum 0dB, CH−B, Prop.
0dB, CH−B, Conv.
Doppler frequency is given by 10
−3
gives N fd Ts = 0.0354. We move the channel taps to the near- (a) OFDM physical layer (M1 = 4, M2 = 2)
est sample-spaced position to simplify the channel emulation.
In the simulations, we take the maximum of the timing 0
10
metric within the window [n̂i − N, n̂i + N ] as the timing
estimate. As we explained earlier, our coarse timing estimates
do not depend on the threshold settings, and for all the
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2565
0 0
10 10
10dB, CH−A, Prop.
10dB, CH−A, Conv.
10dB, CH−B, Prop.
(a) OFDM physical layer (M1 = 4, M2 = 2) (a) OFDM physical layer (M1 = 4, M2 = 2)
0 0
10 10
10dB, CH−A, Prop.
10dB, CH−A, Conv.
10dB, CH−B, Prop.
(b) OFDMA physical layer (L1 = 3) (b) OFDMA physical layer (L1 = 3)
Fig. 7. Missed detection probability per frame. Fig. 8. Histogram of timing estimation error.
correct estimates. Very steep falling edges are observed exactly A PPENDIX A
at Ng /2. This indicates that the probability for large timing A PPROXIMATION TO R[n̂i , d]
offsets or significant ISI would decay quickly out of the From (5), we can expand R[n̂i , d] as
window of correct estimates. It is observed that the estimates
N −d−1
of the proposed method are distributed in a narrower region
j 2π
around the reference timing position than that of the conven- R[n̂i , d] = e N d 0
x̂∗ [n̂i + k]x̂[n̂i + k + d]
tional methods [5], [12]. This suggests superior performance k=0
−d−1
N
of the proposed algorithm. For both proposed and conventional ∗
+ w [n̂i + k]w[n̂i + k + d] + Θ(n̂i , d)
estimators, the coarse timing estimates are evenly distributed
k=0
in the window of correct estimates, so the refined timing (40)
estimation methods [7]–[9] are needed to determine the ideal
timing positions. where Θ(n̂i , d) is defined in (7). The second term in the
bracket of (40) is the summation of products of uncorrelated
VI. C ONCLUSIONS noise terms, its contribution to the value of R[n̂i , d] is much
smaller than the other terms when the signal is not weaker
A universal timing metric combining algorithm is proposed
than the noise. The first term in the bracket is the summation
in this paper to provide robust timing estimation performance
of products of signal terms, which can be expanded as
in various channel conditions. The proposed method can take
advantage of multiple training symbols and work in the sce- x̂∗ [n̂i + k]x̂[n̂i + k + d]
nario where the training symbols consist of highly correlated
Lh
Lh
but not identical segments. Our analysis shows that using more = h ∗
[l1 ]x∗i [k − τ [l1 ]] h[l2 ]xi [k + d − τ [l2 ]]
correlated segments in the training symbol reduces the false l1 =1 l2 =1
alarms but has little impact on the missed detections. The
Lh
simulation results under various channel conditions confirm = |h[l1 ]|2 x∗i [k − τ [l1 ]]xi [k + d − τ [l1 ]]
the robustness of the proposed method. l1 =1
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
2566 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009
Lh
(a) d ≤ N/2 Symb A Symb B
+ h∗ [l1 ]h[l2 ]x∗i [k − τ [l1 ]]xi [k + d − τ [l2 ]]. (41)
l1 =1 l2 =l1
m1 =m2
(42)
d
Because Xi [·] is a pseudo-random PSK modulated training
sequence, the summation of the second term in the bracket Fig. 9. Diagram of the component timing metric in the unequal power case.
of (42) is a summation of phase rotating terms with equal
magnitude, the value is close to 0. However, with properly
selected d, the first term accumulates over the summation and The samples in the correlation window, i.e., from sample n̄i
will dominate the value of the equation. It follows that to (n̄i +N −1), can belong to two OFDM symbols of different
Np [i]
power levels. Assume the boundary of the two symbols is at
1 j 2π (ϑi +(m2 −1)Mi ) d sample (n̄i +(N +Ng −lb )). From Figure 9, we can see that the
xi [k]∗ xi [k + d] ≈ |Xi [1]|2 e N
N m =1 number of samples belonging to the latter OFDM symbol is
2
given by lB = max(0, lb −Ng ), and that of the former symbol
Np
= |Xi [1]|2 ρi (d) φi (d) (43) is lA = (N − max(0, lb − Ng )). Denote the variance of the
N 2
samples of the former symbol as σA , and that of the latter as
where ρi (d) and φi (d) are defined in (8), and (9) respectively, 2
η·σA . It is worth mentioning that substantial power fluctuation
and due to the PSK modulation, |Xi [m2 ]|2 = |Xi [1]|2 . This within one symbol period violates our assumptions and leads
indicates that the correlation between the samples is high when to certain performance degradation. This effect is analyzed in
their distance is close to a multiple of (N/Mi ), and it decays Section V with simulation results.
quickly as the distance to the multiple of (N/Mi ) increases. The denominator of the component timing metric defined
We know the samples whose distance is (d − τ [l2 ] + τ [l1 ]) by (12) can be expanded as
where l1 = l2 are weakly correlated, the summation of their
A −1
l
N −1
products weighted by zero-mean uncorrelated channel gains
R[n̄i , 0] = |r[n̄i + k]|2 + |r[n̄i + k]|2 = χA + χB .
must be small. Hence, we neglect the second summation in
k=0 k=lA
(41) and replace the first one with (43), (45)
Lh where χA and χB are the summations of the squared mag-
Np nitude of the samples in the former and latter symbols re-
x̂∗ [n̂i + k]x̂[n̂i + k + d] ≈ |Xi [1]|2 ρi (d) φi (d) |h[l1 ]|2 .
N spectively, so they follow a Chi-square distribution with (2lA )
l1 =1
(44) and (2lB ) degrees of freedom scaled by σA 2
/2 and ησA2
/2
Substitute the summation of signal products in (40) with (44), respectively. When lA is sufficiently large, χA can be further
drop the summation of uncorrelated noise products, and use approximated by a Gaussian random variable whose mean and
the definition of σi2 in (4), the approximation to R[n̂i , d] is variance are given by
attained and shown in (6).
A −1
l
E {χA } = E |r[n̄i + k]|2 = lA σA
2
, (46)
A PPENDIX B k=0
S TATISTICAL P ROPERTIES OF THE C OMPONENT T IMING
and
M ETRIC AT I NCORRECT T IMING P OSITIONS
2
We derive the statistical properties of the component timing V ar {χA } = E χ2A − (E {χA })
A −1 l
l A −1
metric in an AWGN channel. Following [16], we approximate
the received samples at incorrect timing positions as indepen- = E |r[n̄i + k1 ]|2 |r[n̄i + k2 ]|2 − (lA σA
2 2
)
dent complex-valued zero-mean Gaussian random variables. k1 =0 k2 =0
2
2 2
2
As pointed out in [17], the samples are correlated when there σA σA 2 2
=3 · (2lA ) + 2lA (2lA − 1) − (lA σA )
are unused subcarriers in the OFDM symbols, however, the 2 2
correlation is negligible and the number of unused subcarriers 4
=lA σA . (47)
is small, which is usually the case in practical OFDM systems.
For instance, in the IEEE 802.16 (WiMAX) standard, the This suggests that
√ the mean of χA equals its standard deviation
unused subcarriers (guard bands) occupy about 16% of the multiplied by lA . When lA is large, the deviation of χA
total spectrum. from its mean value is small. Similarly, χB can also be
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2567
approximated by its mean when lB is large. It follows that However, lAA , lAB , lBB change with lb differently in various
scenarios. When d ≤ N/2,
2
R[n̄i , 0] ≈ E {χA } + E {χB } = (lA + ηlB ) σA . (48)
E |R[n̄i , d]|2 |lb = σA 4
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
2568 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009
√
12 −k !
k " ≈ γi (d)
(φ∗i (d) Θ(n̂i , d)) . (65)
Ak ( 2π)k−1 b̃k bi . (60)
For all d1 ≤ d2 , we can show that
i=1
E {Θ∗ (n̂i , d1 )Θ(n̂i , d2 )} = 2σi2 σw
2
φi (d2 − d1 )ρi (d2 − d1 )
When k = 1, the right hand side of (59) reduces to that of · (N − d2 ) (66)
(57), so (59) holds. For k ≥ 1, assume (59) holds for qk . In
the following, we show qk+1 (λ) also satisfies (59) using the E {Θ(n̂i , d1 )Θ(n̂i , d2 )} = 2σi2 σw
2
φi (d2 + d1 )ρi (d2 + d1 )
recursive relationship (58). · max(N − d1 − d2 , 0). (67)
It immediately follows that
qk+1 (λ) # $
λ E R̃[n̂i , 0]|2 ≈ 2N σi2 σw 2
(68)
2 u 2
/(2b2k+1 ) # $
≈ Ak (λ − u)k−1 e−(λ−u) /(2b̃k ) e−u du
0 bk+1 E R̃[n̂i , d]R̃[n̂i , 0] ≈ (N − d) |ρi (d)| σi2
2
· N (σi2 + σw 2 2
bk+1
u− λ
) + 2σw (69)
# $
b̃k+1
λ
− bk+1 b̃k
=
Ak −λ2 /(2b̃k+1 )
e u(λ − u)k−1 e
2
b̃k+1
du E R̃[n̂i , d1 ]R̃[n̂i , d2 ] ≈ γi (d1 )γi (d2 ) ((N − d2 )
bk+1 0
2 · ρi (d2 − d1 ) + ρi (d2 + d1 )
bk+1
u−
b̃k+1
λ
· max(N − d2 − d1 , 0)) . (70)
k−1 +∞
− bk+1 b̃k
Ak −λ2 /(2b̃k+1 ) bk 2
Thus, V ar {ZC [n̂1 ]} can be obtained by substituting (68), (69)
≈ e k
λ e b̃k+1
du
b̃k+1 b̃k+1 −∞ and (70) into (63), and the result is shown in (38). Let all
2
=Ak+1 λk e−λ /(2b̃k+1 )
(61) ρi (d) = 1 in (38), we can simplify the expression for the
variance of ZA [n̂1 ] to that in (26).
where the first approximation follows the assumption about
A PPENDIX E
qk (λ), the second approximation follows the fact that the
T HE M EAN AND VARIANCE OF ZB [n̂1 ]
exponential term approximates 0 very quickly out of the
b
small region around u = b̃k+1 λ. Therefore, (59) holds for The mean of ZB [n̂1 ] can be directly evaluated by
k+1
all k. Combining it with (56), (17) is obtained. The derivation E {ZB [n̂1 ]} = N 2 σ12 (σ12 + σw
2
) − λN 2 (σ12 + σw
2 2
) . (71)
indicates that the approximation is accurate for large λ values.
The second moment of ZB [n̂1 ] can be expanded to
E ZB [n̂1 ]2 = λ2 E R[n̂1 , 0]2 E R[n̂2 , 0]2
# $
A PPENDIX D + E (|RB,1 [n̂1 ]|R[n̂2 , 0] + |RB,2 [n̂2 ]|R[n̂1 , 0])
2
T HE M EAN AND VARIANCE OF ZA [n̂1 ] AND ZC [n̂1 ]
− λE {|RB,1 [n̂1 ]|R[n̂1 , 0]} E |RB,2 [n̂2 ]|2
Because Case A can be seen as a special case of Case C, the − λE {|RB,2 [n̂2 ]|R[n̂2 , 0]} E |RB,1 [n̂1 ]|2 . (72)
mean and variance of ZA [n̂1 ] can be obtained by simplifying According to the definition of RB,i [n̂i ], we can compute
those of ZC [n̂1 ] with an extra condition (ρ1,k = 1). The mean
of ZC [n̂1 ] can be directly computed from (36) as E {RB,i [n̂i ]R[n̂i , 0]}
Mi − 1
=N σi2 N (σi2 + σw 2 2
) + 2σw . (73)
E {ZC [n̂1 ]} = N σ12 − λN (σ12 + 2
σw ). (62) M1 + M2 − 2
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.
RUAN et al.: TRAINING SYMBOL BASED COARSE TIMING SYNCHRONIZATION IN OFDM SYSTEMS 2569
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:34 from IEEE Xplore. Restrictions apply.